ID OPENVAS:136141256231011517 Type openvas Reporter Copyright (C) 2003 Michel Arboi Modified 2020-03-20T00:00:00
Description
According to its version number in the banner
the Leafnode NNTP server is vulnerable to a denial of service.
# OpenVAS Vulnerability Test
# Description: Leafnode denials of service
#
# Authors:
# Michel Arboi <arboi@alussinan.org>
#
# Copyright:
# Copyright (C) 2003 Michel Arboi
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.11517");
script_version("2020-03-20T07:32:27+0000");
script_tag(name:"last_modification", value:"2020-03-20 07:32:27 +0000 (Fri, 20 Mar 2020)");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_cve_id("CVE-2002-1661");
script_bugtraq_id(6490);
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_name("Leafnode denials of service");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2003 Michel Arboi");
script_family("General");
script_dependencies("nntpserver_detect.nasl");
script_require_ports("Services/nntp", 119);
script_mandatory_keys("nntp/detected");
script_tag(name:"solution", value:"Update to version 1.9.48 or later.");
script_tag(name:"summary", value:"According to its version number in the banner
the Leafnode NNTP server is vulnerable to a denial of service.");
script_tag(name:"impact", value:"The service may:
- go into an infinite loop with 100% CPU use when an article that has been crossposted to
several groups, one of which is the prefix of another, and when this article is then requested
by its Message-ID.
- hang without consuming CPU while waiting for data that never come.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"remote_banner");
exit(0);
}
include("nntp_func.inc");
include("misc_func.inc");
port = nntp_get_port(default:119);
banner = get_kb_item("nntp/banner/" + port);
if(!banner || "Leafnode" >!< banner)
exit(0);
# Example of banner:
# 200 Leafnode NNTP Daemon, version 1.9.32.rel running at localhost (my fqdn: www.example.com)
if(ereg(string:banner, pattern:"version +1\.9\.2[0-9]") ||
ereg(string:banner, pattern:"version +1\.9\.([3-9]|[1-3][0-9]|4[0-7])[^0-9]") ||
ereg(string:banner, pattern:"version +1\.9\.19")) {
security_message(port:port);
exit(0);
}
exit(99);
{"id": "OPENVAS:136141256231011517", "type": "openvas", "bulletinFamily": "scanner", "title": "Leafnode denials of service", "description": "According to its version number in the banner\n the Leafnode NNTP server is vulnerable to a denial of service.", "published": "2005-11-03T00:00:00", "modified": "2020-03-20T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231011517", "reporter": "Copyright (C) 2003 Michel Arboi", "references": [], "cvelist": ["CVE-2002-1661"], "lastseen": "2020-03-23T14:37:04", "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2002-1661"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2002-1661"]}, {"type": "freebsd", "idList": ["F7A3B18C-624C-4703-9756-B6B27429E5B0"]}, {"type": "nessus", "idList": ["1887.PRM", "FREEBSD_PKG_F7A3B18C624C47039756B6B27429E5B0.NASL", "LEAFNODE_1_9_29.NASL", "MANDRAKE_MDKSA-2003-005.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:11517"]}], "rev": 4}, "score": {"value": 4.8, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2002-1661"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2002-1661"]}, {"type": "freebsd", "idList": ["F7A3B18C-624C-4703-9756-B6B27429E5B0"]}, {"type": "nessus", "idList": ["FREEBSD_PKG_F7A3B18C624C47039756B6B27429E5B0.NASL"]}]}, "exploitation": null, "vulnersScore": 4.8}, "pluginID": "136141256231011517", "sourceData": "# OpenVAS Vulnerability Test\n# Description: Leafnode denials of service\n#\n# Authors:\n# Michel Arboi <arboi@alussinan.org>\n#\n# Copyright:\n# Copyright (C) 2003 Michel Arboi\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.11517\");\n script_version(\"2020-03-20T07:32:27+0000\");\n script_tag(name:\"last_modification\", value:\"2020-03-20 07:32:27 +0000 (Fri, 20 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)\");\n script_cve_id(\"CVE-2002-1661\");\n script_bugtraq_id(6490);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Leafnode denials of service\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2003 Michel Arboi\");\n script_family(\"General\");\n script_dependencies(\"nntpserver_detect.nasl\");\n script_require_ports(\"Services/nntp\", 119);\n script_mandatory_keys(\"nntp/detected\");\n\n script_tag(name:\"solution\", value:\"Update to version 1.9.48 or later.\");\n\n script_tag(name:\"summary\", value:\"According to its version number in the banner\n the Leafnode NNTP server is vulnerable to a denial of service.\");\n\n script_tag(name:\"impact\", value:\"The service may:\n\n - go into an infinite loop with 100% CPU use when an article that has been crossposted to\n several groups, one of which is the prefix of another, and when this article is then requested\n by its Message-ID.\n\n - hang without consuming CPU while waiting for data that never come.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n exit(0);\n}\n\ninclude(\"nntp_func.inc\");\ninclude(\"misc_func.inc\");\n\nport = nntp_get_port(default:119);\n\nbanner = get_kb_item(\"nntp/banner/\" + port);\nif(!banner || \"Leafnode\" >!< banner)\n exit(0);\n\n# Example of banner:\n# 200 Leafnode NNTP Daemon, version 1.9.32.rel running at localhost (my fqdn: www.example.com)\n\nif(ereg(string:banner, pattern:\"version +1\\.9\\.2[0-9]\") ||\n ereg(string:banner, pattern:\"version +1\\.9\\.([3-9]|[1-3][0-9]|4[0-7])[^0-9]\") ||\n ereg(string:banner, pattern:\"version +1\\.9\\.19\")) {\n security_message(port:port);\n exit(0);\n}\n\nexit(99);\n", "naslFamily": "General", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1646478213}}
{"nessus": [{"lastseen": "2021-10-16T15:37:31", "description": "According to its version number, the remote Leafnode NNTP server is vulnerable to a denial of service attack. Specifically, it may go into an infinite loop with 100% CPU use when an article that has been crossposted to several groups, one of which is the prefix of another, and when this article is then requested by its Message-ID. \n\nNote that Nessus did not actually test for the flaw but instead has relied on the version in Leafnode's banner so this may be a false positive.", "cvss3": {"score": null, "vector": null}, "published": "2009-10-27T00:00:00", "type": "nessus", "title": "leafnode Cross-Posted Article Group Name Prefix DoS", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2002-1661"], "modified": "2018-07-12T00:00:00", "cpe": [], "id": "LEAFNODE_1_9_29.NASL", "href": "https://www.tenable.com/plugins/nessus/42259", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(42259);\n script_version (\"1.8\");\n script_cvs_date(\"Date: 2018/07/12 19:01:16\");\n\n script_cve_id(\"CVE-2002-1661\");\n script_bugtraq_id(6490);\n\n script_name(english:\"leafnode Cross-Posted Article Group Name Prefix DoS\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote NNTP server is vulnerable to a denial of service attack.\" );\n script_set_attribute(attribute:\"description\", value:\n\"According to its version number, the remote Leafnode NNTP server is\nvulnerable to a denial of service attack. Specifically, it may go\ninto an infinite loop with 100% CPU use when an article that has been\ncrossposted to several groups, one of which is the prefix of another,\nand when this article is then requested by its Message-ID. \n\nNote that Nessus did not actually test for the flaw but instead has\nrelied on the version in Leafnode's banner so this may be a false\npositive.\");\n script_set_attribute(attribute:\"see_also\", value: \"http://leafnode.sourceforge.net/leafnode-SA-2002-01.txt\");\n script_set_attribute(attribute:\"solution\", value: \"Upgrade to 1.9.48 or later.\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2009/10/27\");\n script_set_attribute(attribute:\"vuln_publication_date\", value: \"2002/12/30\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_end_attributes();\n\n script_summary(english:\"Check Leafnode version number for flaws\");\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Misc.\");\n script_dependencie(\"nntpserver_detect.nasl\");\n script_require_ports(\"Services/nntp\", 119);\n script_require_keys(\"nntp/leafnode\");\n exit(0);\n}\n\n#\n\nport = get_kb_item(\"Services/nntp\");\nif (! port) port = 119;\nif (! get_port_state(port)) exit(0);\n\nk = string(\"nntp/banner/\", port);\nb = get_kb_item(k);\nif (! b)\n{\n soc = open_sock_tcp(port);\n if (! soc) exit(0);\n b = recv_line(socket: soc, length: 2048);\n close(soc);\n}\n\n# Example of banner:\n# 200 Leafnode NNTP Daemon, version 1.9.32.rel running at localhost (my fqdn: www.nessus.org)\n\nif (\"Leafnode\" >< b)\n{\n if (ereg(string: b, pattern: \"version +1\\.9\\.2[0-9]\"))\n {\n security_warning(port: port);\n }\n}\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:19:36", "description": "A vulnerability was discovered by Jan Knutar in leafnode that Mark Brown pointed out could be used in a Denial of Service attack. This vulnerability causes leafnode to go into an infinite loop with 100% CPU use when an article that has been crossposed to several groups, one of which is the prefix of another, is requested by it's Message-ID.\n\nThis vulnerability was introduced in 1.9.20 and fixed upstream in version 1.9.30. Only Mandrake Linux 9.0 is affected by this, but version 1.9.19 (which shipped with Mandrake Linux 8.2) is receiving an update due to critical bugs in it that can corrupt parts of its news spool under certain circumstances.", "cvss3": {"score": null, "vector": null}, "published": "2004-07-31T00:00:00", "type": "nessus", "title": "Mandrake Linux Security Advisory : leafnode (MDKSA-2003:005)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2002-1661"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:leafnode", "cpe:/o:mandrakesoft:mandrake_linux:8.2", "cpe:/o:mandrakesoft:mandrake_linux:9.0"], "id": "MANDRAKE_MDKSA-2003-005.NASL", "href": "https://www.tenable.com/plugins/nessus/13990", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2003:005. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(13990);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2002-1661\");\n script_xref(name:\"MDKSA\", value:\"2003:005\");\n\n script_name(english:\"Mandrake Linux Security Advisory : leafnode (MDKSA-2003:005)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Mandrake Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability was discovered by Jan Knutar in leafnode that Mark\nBrown pointed out could be used in a Denial of Service attack. This\nvulnerability causes leafnode to go into an infinite loop with 100%\nCPU use when an article that has been crossposed to several groups,\none of which is the prefix of another, is requested by it's\nMessage-ID.\n\nThis vulnerability was introduced in 1.9.20 and fixed upstream in\nversion 1.9.30. Only Mandrake Linux 9.0 is affected by this, but\nversion 1.9.19 (which shipped with Mandrake Linux 8.2) is receiving an\nupdate due to critical bugs in it that can corrupt parts of its news\nspool under certain circumstances.\"\n );\n # http://marc.theaimsgroup.com/?l=bugtraq&m=104127108823436&w=2\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://marc.info/?l=bugtraq&m=104127108823436&w=2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected leafnode package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:leafnode\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandrakesoft:mandrake_linux:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandrakesoft:mandrake_linux:9.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2003/01/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2004/07/31\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK8.2\", cpu:\"i386\", reference:\"leafnode-1.9.31-1.1mdk\", yank:\"mdk\")) flag++;\n\nif (rpm_check(release:\"MDK9.0\", cpu:\"i386\", reference:\"leafnode-1.9.31-1.1mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:19:16", "description": "The remote host is running the LeafNode NNTP server. The version of LeafNode that is installed is vulnerable to a denial of service attack that may be abused by an attacker to cause this system to fail.", "cvss3": {"score": 5.3, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}, "published": "2004-08-20T00:00:00", "type": "nessus", "title": "LeafNode < 1.9.30 Resource Exhaustion DoS", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2002-1661"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:a:leafnode:leafnode:*:*:*:*:*:*:*:*"], "id": "1887.PRM", "href": "https://www.tenable.com/plugins/nnm/1887", "sourceData": "Binary data 1887.prm", "cvss": {"score": 5, "vector": "CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T13:17:09", "description": "The leafnode NNTP server may go into an unterminated loop with 100% CPU use when an article is requested by Message-ID that has been crossposted to several news groups when one of the group names is the prefix of another group name that the article was cross-posted to.\nFound by Jan Knutar.", "cvss3": {"score": null, "vector": null}, "published": "2005-07-13T00:00:00", "type": "nessus", "title": "FreeBSD : leafnode denial-of-service triggered by article request (f7a3b18c-624c-4703-9756-b6b27429e5b0)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2002-1661"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:leafnode", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_F7A3B18C624C47039756B6B27429E5B0.NASL", "href": "https://www.tenable.com/plugins/nessus/19177", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(19177);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2002-1661\");\n script_bugtraq_id(6490);\n\n script_name(english:\"FreeBSD : leafnode denial-of-service triggered by article request (f7a3b18c-624c-4703-9756-b6b27429e5b0)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The leafnode NNTP server may go into an unterminated loop with 100%\nCPU use when an article is requested by Message-ID that has been\ncrossposted to several news groups when one of the group names is the\nprefix of another group name that the article was cross-posted to.\nFound by Jan Knutar.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://leafnode.sourceforge.net/leafnode-SA-2002-01.txt\"\n );\n # http://sourceforge.net/mailarchive/message.php?msg_id=2796226\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://sourceforge.net/p/anope/mailman/message/2796226/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://article.gmane.org/gmane.network.leafnode.announce/8\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=46613\"\n );\n # https://vuxml.freebsd.org/freebsd/f7a3b18c-624c-4703-9756-b6b27429e5b0.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9e856f5c\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:leafnode\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/11/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/05/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/07/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"leafnode>=1.9.20<1.9.30\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "cve": [{"lastseen": "2022-03-23T13:29:40", "description": "The leafnode server in leafnode 1.9.20 to 1.9.29 allows remote attackers to cause a denial of service (infinite loop) when leafnode requests a cross-posted article to one group whose name is a prefix of another group.", "cvss3": {}, "published": "2002-12-31T05:00:00", "type": "cve", "title": "CVE-2002-1661", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2002-1661"], "modified": "2017-07-11T01:29:00", "cpe": ["cpe:/a:leafnode:leafnode:1.9.19", "cpe:/a:leafnode:leafnode:1.9.21", "cpe:/a:leafnode:leafnode:1.9.27", "cpe:/a:leafnode:leafnode:1.9.22", "cpe:/a:leafnode:leafnode:1.9.26", "cpe:/a:leafnode:leafnode:1.9.24", "cpe:/a:leafnode:leafnode:1.9.25", "cpe:/a:leafnode:leafnode:1.9.29", "cpe:/a:leafnode:leafnode:1.9.20", "cpe:/a:leafnode:leafnode:1.9.23"], "id": "CVE-2002-1661", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1661", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:leafnode:leafnode:1.9.21:*:*:*:*:*:*:*", "cpe:2.3:a:leafnode:leafnode:1.9.24:*:*:*:*:*:*:*", "cpe:2.3:a:leafnode:leafnode:1.9.23:*:*:*:*:*:*:*", "cpe:2.3:a:leafnode:leafnode:1.9.19:*:*:*:*:*:*:*", "cpe:2.3:a:leafnode:leafnode:1.9.20:*:*:*:*:*:*:*", "cpe:2.3:a:leafnode:leafnode:1.9.29:*:*:*:*:*:*:*", "cpe:2.3:a:leafnode:leafnode:1.9.26:*:*:*:*:*:*:*", "cpe:2.3:a:leafnode:leafnode:1.9.27:*:*:*:*:*:*:*", "cpe:2.3:a:leafnode:leafnode:1.9.22:*:*:*:*:*:*:*", "cpe:2.3:a:leafnode:leafnode:1.9.25:*:*:*:*:*:*:*"]}], "freebsd": [{"lastseen": "2022-01-19T16:03:51", "description": "\n\nThe leafnode NNTP server may go into an unterminated loop with 100%\n\t CPU use when an article is requested by Message-ID that has been\n\t crossposted to several news groups when one of the group names is the\n\t prefix of another group name that the article was cross-posted\n\t to. Found by Jan Knutar.\n\n", "cvss3": {}, "published": "2002-11-06T00:00:00", "type": "freebsd", "title": "leafnode denial-of-service triggered by article request", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2002-1661"], "modified": "2005-05-13T00:00:00", "id": "F7A3B18C-624C-4703-9756-B6B27429E5B0", "href": "https://vuxml.freebsd.org/freebsd/f7a3b18c-624c-4703-9756-b6b27429e5b0.html", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "openvas": [{"lastseen": "2017-12-08T11:44:06", "description": "According to its version number that OpenVAS read in the banner, \nyour Leafnode NNTP server is vulnerable to a denial of service.\n\n** Note that OpenVAS did not check the actual flaw and\n** relied upon the banner, so this may be a false positive.", "cvss3": {}, "published": "2005-11-03T00:00:00", "type": "openvas", "title": "Leafnode denials of service", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2002-1661"], "modified": "2017-12-07T00:00:00", "id": "OPENVAS:11517", "href": "http://plugins.openvas.org/nasl.php?oid=11517", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: leafnode_version.nasl 8023 2017-12-07 08:36:26Z teissa $\n# Description: Leafnode denials of service\n#\n# Authors:\n# Michel Arboi <arboi@alussinan.org>\n#\n# Copyright:\n# Copyright (C) 2003 Michel Arboi\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ntag_summary = \"According to its version number that OpenVAS read in the banner, \nyour Leafnode NNTP server is vulnerable to a denial of service.\n\n** Note that OpenVAS did not check the actual flaw and\n** relied upon the banner, so this may be a false positive.\";\n\ntag_solution = \"upgrade it to 1.9.48 or later\";\n\nif(description)\n{\n script_id(11517);\n script_version(\"$Revision: 8023 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-07 09:36:26 +0100 (Thu, 07 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)\");\n script_cve_id(\"CVE-2002-1661\");\n script_bugtraq_id(6490);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n name = \"Leafnode denials of service\";\n script_name(name);\n\n \n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n \n script_copyright(\"This script is Copyright (C) 2003 Michel Arboi\");\n family = \"General\";\n script_family(family);\n\n script_dependencies(\"nntpserver_detect.nasl\");\n script_require_ports(\"Services/nntp\", 119);\n\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n#\n\nport = get_kb_item(\"Services/nntp\");\nif (! port) port = 119;\nif (! get_port_state(port)) exit(0);\n\nk = string(\"nntp/banner/\", port);\nb = get_kb_item(k);\nif (! b)\n{\n soc = open_sock_tcp(port);\n if (! soc) exit(0);\n b = recv_line(socket: soc, length: 2048);\n close(soc);\n}\n\n# Example of banner:\n# 200 Leafnode NNTP Daemon, version 1.9.32.rel running at localhost (my fqdn: www.openvas.org)\n\nif (\"Leafnode\" >< b)\n{\n if (ereg(string: b, pattern: \"version +1\\.9\\.2[0-9]\"))\n {\n report = \"\nAccording to its version number that OpenVAS read in the banner, \nyour Leafnode NNTP server is vulnerable to a denial of service:\nit may go into an infinite loop with 100% CPU use when an article \nthat has been crossposted to several groups, one of which is the \nprefix of another, and when this article is then requested by its \nMessage-ID.\n\n** Note that OpenVAS did not check the actual flaw and\n** relied upon the banner, so this may be a false positive.\n\nSolution: upgrade it to 1.9.48 or later\";\n security_message(port: port, data: report);\n }\n else if (ereg(string: b, pattern: \"version +1\\.9\\.([3-9]|[1-3][0-9]|4[0-7])[^0-9]\"))\n {\n report=\"\nAccording to its version number that OpenVAS read in the banner, \nyour Leafnode NNTP server is vulnerable to a denial of service:\nit may hangs without consuming CPU while waiting for data that \nnever come.\n\n** Note that OpenVAS did not check the actual flaw and\n** relied upon the banner, so this may be a false positive.\n\nSolution: upgrade it to 1.9.48 or later\";\n security_message(port: port, data: report);\n }\n\n # Better double check this old version, although this is not strictly\n # a _security_ bug\n if (ereg(string: b, pattern: \"version +1\\.9\\.19\"))\n {\n report=\"\nAccording to its version number (1.9.19) that OpenVAS read in \nthe banner, your Leafnode NNTP server has some critical \nbugs and should not be used: it can corrupt parts of its news\nspool under certain circumstances.\n\n** Note that OpenVAS did not check the actual flaw and\n** relied upon the banner, so this may be a false positive.\n\nSolution: upgrade it to 1.9.48 or later\";\n security_message(port: port, data: report);\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "debiancve": [{"lastseen": "2022-01-10T05:54:42", "description": "The leafnode server in leafnode 1.9.20 to 1.9.29 allows remote attackers to cause a denial of service (infinite loop) when leafnode requests a cross-posted article to one group whose name is a prefix of another group.", "cvss3": {}, "published": "2002-12-31T05:00:00", "type": "debiancve", "title": "CVE-2002-1661", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2002-1661"], "modified": "2002-12-31T05:00:00", "id": "DEBIANCVE:CVE-2002-1661", "href": "https://security-tracker.debian.org/tracker/CVE-2002-1661", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}